Trusted Computing

Results: 881



#Item
501Software / Computing / Computer programming / ODBC

QSS and Minisoft Breathe New Life Into A Trusted Legacy Platform. “QSS demonstrated the new Employee Self Service web-based applica�on (ESS) at the QSS Users Group conference in March[removed]The

Add to Reading List

Source URL: www.minisoft.com

Language: English
502Remote desktop / Trusted computing / Trusted Platform Module / X Window System / Trusted Execution Technology / Google Chrome OS / Thin client / Desktop virtualization / Hyper-V / Software / System software / Computing

Cloud Terminal: Secure Access to Sensitive Applications from Untrusted Systems Lorenzo Martignoni,∗ Pongsin Poosankam,∗† Matei Zaharia,∗ Jun Han,† Stephen McCamant,∗ Dawn Song,∗ Vern Paxson,∗ Adrian Perri

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2012-05-07 17:38:00
503Computing / Computer security / Identity / Electronic commerce / National Cybersecurity Center / Computer network security / Security / National Strategy for Trusted Identities in Cyberspace

Microsoft Word[removed]NSTIC Quotes FINAL.docx

Add to Reading List

Source URL: assets.fiercemarkets.com

Language: English - Date: 2011-04-15 11:46:04
504Evaluation / Data security / National Information Assurance Partnership / Common Criteria / Capability Maturity Model / National Security Agency / Rainbow Series / Trusted Computer System Evaluation Criteria / Information security / Computer security / Security / Computing

The National Security Agency’s Use of the Systems Security Engineering Capability Maturity Model (SSE-CMM) Panel Chair: Ms. Mary D. Schanken National Security Agency 9800 Savage Road

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
505Computing / Client–server model / Peer-to-peer / Trusted Computing / Communications protocol / Secure two-party computation / Secure multi-party computation / Cryptographic protocols / Data / Information

Exploring Privacy in Location-based Services Using Cryptographic Protocols

Add to Reading List

Source URL: nsl.cse.unt.edu

Language: English - Date: 2012-01-10 15:06:54
506Trusted computing / Computer network security / Trusted Platform Module / Trusted Execution Technology / Hypervisor / Virtual private server / Hyper-V / Computer security / IBM cloud computing / Cloud computing / System software / Computing

DRAFT NISTIR 7904, Trusted Geolocation in the Cloud: Proof of Concept Implementation

Add to Reading List

Source URL: nccoe.nist.gov

Language: English - Date: 2014-06-27 15:40:55
507Crime prevention / National security / Computer network security / Information security / Common Criteria / Trusted computing base / Trusted Computer System Evaluation Criteria / Security policy / Personal digital assistant / Security / Computer security / Public safety

Themes and Highlights of the New Security Paradigms Workshop 2000 Chair: Steven J. Greenwald Independent INFOSEC Consultant 2521 NE 135 Street

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
508Supercomputers / Computer memory / Direct memory access / Motherboard / Myrinet / Trusted computing base / Kernel / Ring / Device driver / Computing / Computer hardware / Computer networks

Security of High-Performance Messaging Layers on Programmable Network Interface Architectures Srigurunath Chakravarthi [removed] Department of Computer Science Mississippi State University

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
509ITSEC / Evaluation Assurance Level / Protection Profile / Trusted Computer System Evaluation Criteria / Secure Computing / Security Target / Purchasing / Cryptographic Module Testing Laboratory / CTCPEC / Computer security / Evaluation / Common Criteria

Trends in Government Endorsed Security Product Evaluations Richard E. Smith Secure Computing Corporation [removed] Abstract Government endorsed security product evaluations completed between

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
510Computer network security / Crime prevention / Electronic commerce / National security / Secure communication / Trusted system / Operating system / Trusted computing base / Vulnerability / Computer security / Security / Cyberwarfare

Proceedings of the Seminar on the DoD Computer Security Initiative Program, July 17-18, 1979, Gaithersburg, Maryland

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-08-22 14:26:10
UPDATE